On using Mobile IP Protocols

Size: px
Start display at page:

Download "On using Mobile IP Protocols"

Transcription

1 Journal of Computer Science 2 (2): , 2006 ISSN Science Publications On using Mobile IP Protocols Fayza A. Nada Faculty of Computers and Information, Suez Canal University, Ismailia, Egypt Abstract: The recent advances in wireless communication technology and the unprecedented growth of the Internet have paved the way for wireless networking and IP mobility. Mobile Internet protocol has been designed within the IETF to support the mobility of users who wish to connect to the Internet and maintain communications as they move from place to place. This study describes and summarizes the current Internet draft for mobile IP (MIPv4) with its major components: agent discovery, registration and tunneling. In addition, we outline the available encapsulation techniques and route optimization procedure. In the end, we describe the design of the new protocol for transparent routing of IPv6 packets to mobile IPv6 nodes operating in the Internet. Key words: Mobile IP, MIPv4, MIPv6, mobile networking, encapsulation, route optimization INTRODUCTION Mobile communications services have experienced remarkable growth and among these, services providing Internet access from mobile terminals are steadily increasing by tens of thousands of subscribers per day [1]. To create IP-based mobility management mechanism, efforts are being made to implement mobility management at the IP level (so called IP mobility) by using IP addresses, for example, instead of managing the movement of terminals within a mobile network according to the conventional mobile terminal number or subscriber number [2]. Advantages of implementing IP mobility include the ability to implement universal mobility management mechanisms independent of specific access networks and the ability to provide seamless mobile services spanning wireless access network generations and even heterogeneous access networks including both mobile and fixed networks. Since IP mobility supports the implementation of network integration and services between mobile and fixed networks, it is becoming an important technology not only for mobile networks but also for fixed networks [3]. Mobile IP is an Internet protocol designed to support host mobility. Its goal is to provide the ability of a host to stay connected to the Internet regardless of its location. Mobile IP is able to track a mobile host without needing to change the mobile host's long term IP address [4]. IP addresses are used to identify a particular end system. One can use an IP address to identify one particular node out of the tens of millions of computer nodes making up the Internet. Popular transport protocols such as Transmission Control Protocol (TCP) [5] keep track of their internal session state between the communicating endpoints by using the IP address of the two endpoints, however, IP addresses are also used to find a route between the endpoints. The route does not have to be the same in both directions; the route selected for a datagram depends only on the IP destination address and not on the IP source address. These two uses of IP addresses result in the following contradiction for mobile computing. On one hand, a mobile computer needs to have a stable IP address to be identified to other Internet nodes. On the other, if the address is fixed, the datagrams routing to the mobile computer will always go to the same place, thus no mobility. Mobile IP extends IP by allowing the mobile computer to have two addresses, one for identification and the other for routing. Fig. 1: Mobile IP overview We can outline the operation of the basic mobile IP protocol (MIPv4) as follows [6] : Mobility agents send agent advertisement messages. After receiving an agent advertisement, a mobile node can determine whether it is attached to the home network or to a foreign network. When a mobile node is attached to a foreign network, it obtains a care-of address on that foreign network. The mobile node registers its care-of address with its home agent. As shown in Fig. 1, the home agent receives all datagrams distended to the mobile node's home address and tunnels them to the mobile node's care-of address. In order for the home agent to deliver a datagram to the care-of address, it uses a procedure called encapsulation or tunneling (shown by the thick tube in the figure). Corresponding Author: Fayza A. Nada, Faculty of computers and information, Suez Canal University, Ismailia, Egypt 211

2 The original datagram is encapsulated by another IP header with the destination is the care-of address and then delivered by the home agent. When the foreign agent receives the encapsulated datagram, it decapsulates it, removing the encapsulating IP header and delivers the inner datagram to the mobile node which is presumed to be on the same link as one of the foreign agent's network interfaces. Datagrams sent the mobile node are delivered to their destination using standard IP routing mechanism [7]. MOBILE IP OVERVIEW Mobile IP is considered as a cooperation of the three procedures: Agent discovery, Registration and Tunneling. When a mobile node moves within range of foreign agent, it listens for advertisements which contain a care-of address. If no advertisements are detected, the mobile node may solicit for a care-of address. In many cases the only way the mobile node can detect whether it has moved is by comparing new advertisements with previous ones and determining whether the offered care-of address has changed [8]. Agent discovery: The method of detecting a mobility agent is quite similar to that used by Internet nodes to detect routers by running Internet control message protocol (ICMP) Router discovery (RFC 1256) [9]. The basic operation involves periodic broadcasts of advertisements by the routers onto their directly attached networks. Protocol engineer try to reuse existing system components to avoid old errors and benefit from the experience of others. So that, the Mobile IP working group supports the special additional needs of mobility agents by attaching special extensions to the standard ICMP [10] messages. That is, mobile service advertisements and solicitations are transported via ICMP messages, with the ICMP payload containing one or more special mobile extensions [7]. Agent solicitation: Mobile nodes use router solicitations ICMP messages to detect any changes in the set of mobility agents available at the current point of attachment. If advertisements are no longer detectable from a foreign agent that previously had offered a care-of address to the mobile node, the mobile node should presume that foreign agent is no longer within range of the mobile node's network interface. In this case, the mobile node should hunt for a new care-of address or use a care-of address known from advertisements it is still receiving [11]. The mobile node may choose to wait for another advertisement if it has not received any recently advertised careof addresses or it may send agent solicitation, the mobile IP agent solicitation message format is illustrated in Fig. 2. J. Computer Sci., 2 (2): , Fig. 2: Agent solicitation (from RFC 1256) Agent advertisement: The mobile IP discovery process has been built on top of the existing standard protocol Router Advertisement, specified in RFC 1256 [12]. Mobile IP Agent discovery does not change the original fields of existing router advertisements but extends them to associate mobility functions. A router advertisement can carry information about routers and carry further information about one or more care-of addresses and in this case they are called agent advertisements. Home agents and foreign agents broadcast agent advertisements at regular intervals. To get a care-of address, a mobile node can either waits to get an agent advertisement or broadcasts a solicitation that will be answered by any foreign agent or home agent that receives it. Mobility agent extension format is shown in Fig. 3.. Fig. 3: Mobility agent advertisement extension Registration: Mobile IP provides a mechanism by which the mobile node can send information to its home agent. Registration process (shown in Fig. 4) enables the mobile node to: * Inform the home agent about its current care-of address. * Renew the registration when moving to a new point of attachment. * Deregister when returning back to its home network. Fig. 4: Registration overview

3 J. Computer Sci., 2 (2): , 2006 Registration request: The registration messages use the User Datagram Protocol (UDP). A nonzero UDP checksum should be included in the header and not checked by the recipient. A mobile node registers with its home agent using a registration request message so that its home agent can create or modify binding for that mobile node. The registration process is almost the same whether the mobile node has obtained its care-of address from a foreign agent, or alternatively has acquired it from another independent service such as DHCP. After the IP and UDP headers, the registration request has the structure illustrated in Fig. 5. Fig. 5: Registration request packet format Fig. 6: Registration reply packet format Registration reply: A mobility agent returns a registration reply message to a mobile node which has sent a registration request message. If the mobile node is requesting service through a foreign agent, that foreign agent will receive the reply and relay it to the mobile node. The reply message is shown in Fig. 6, it contains the necessary codes to inform the mobile node about the status of its request, along with the lifetime granted by the home agent, which may be smaller than the original request. The foreign agent should not increase the lifetime selected by the mobile node in the registration request, since the lifetime is covered by the mobile-home authentication extension which can not be correctly recomputed by the foreign agent. The home agent must not increase the lifetime selected by the mobile node in the registration request since doing so could increase it beyond the maximum registration lifetime allowed by the foreign agent. If the lifetime received in the registration reply is greater than that in the registration request, the lifetime in the request should be used. When the lifetime received in the registration reply is less than that in the registration request, the lifetime in the reply should be used [13]. Tunneling and routing: Mobile IP specifies a method by which an IP datagram may be encapsulated (carried as payload) within an IP datagram. Encapsulation is a means to change the normal IP routing for datagrams, by delivering them to an intermediate destination that would otherwise not be selected based on the IP Destination Address field in the original IP header. Once the encapsulated datagram arrives at this intermediate destination node, it is decapsulated, yielding the original IP datagram, which is then delivered to the destination indicated by the original Destination Address field. This use of encapsulation and decapsulation of a datagram is frequently referred to as "tunneling" the datagram and the encapsulator and decapsulator are then considered to be the "endpoints" of the tunnel, with the source, encapsulator, decapsulator and destination being separate nodes [14]. IP within IP encapsulation: To encapsulate an IP datagram using IP within IP encapsulation, an outer IP header [15] is inserted before the datagram's existing IP header, as shown in Fig. 7. The outer IP header Source Address and Destination Address identify the "endpoints" of the tunnel, the inner IP header Source Address and Destination Addresses identify the original sender and recipient of the datagram, respectively. The inner IP header is not changed by the encapsulator, except to decrement the TTL as noted below and remains unchanged during its delivery to the tunnel exit point. No change to IP options in the inner header occurs during delivery of the encapsulated datagram through the tunnel. If needed, other protocol headers such as the IP Authentication header [16] may be inserted between the outer IP header and the inner IP header. Note that the security options of the inner IP header may affect the choice of security options for the encapsulating (outer) IP header. Fig. 7: IP within IP encapsulation Minimal encapsulation: A minimal forwarding header is defined for datagrams which are not fragmented prior to encapsulation. Use of this encapsulation method is optional. Minimal encapsulation must not be used when an original datagram is already fragmented, since there is no room in the minimal forwarding header to store fragmentation information. To encapsulate an IP 213

4 datagram using minimal encapsulation, the IP header of the original datagram is modified and the minimal forwarding header is inserted into the datagram after the IP header, followed by the unmodified IP payload of the original datagram. No additional IP header is added to the datagram. The format of the minimal forwarding header is shown in Fig. 8. J. Computer Sci., 2 (2): , 2006 Fig. 8: Minimal encapsulation header format When decapsulating a datagram, the fields in the minimal forwarding header are restored to the IP header and the minimal forwarding header is removed from the datagram. In addition, the Total Length field in the IP header is decremented by the size of the minimal forwarding header removed from the datagram and the Header Checksum field in the IP header is recomputed [15] or updated to account for the changes to the IP header described here for decapsulation. The encapsulator may use existing IP mechanisms appropriate for delivery of the encapsulated payload to the tunnel exit point. In particular, use of IP options are allowed and use of fragmentation is allowed unless the "Don't Fragment" bit is set in the IP header [17]. PROBLEMS OF BASE MOBILE IP PROTOCOL Mobile IP still has many items that need to be worked on and enhanced such as the security issue and the routing issue. The IETF has been working on the problems which had been found on the base Mobile IP protocol. Triangle routing: As noted above, datagrams going to the mobile node have to travel through the home agent when the mobile node is away from home, but datagrams from the mobile node to other stationary Internet nodes can be routed directly to their destinations. This additional routing, called triangle routing and shown in Fig. 9, is generally far from optimal, especially in cases when the correspondent node is very close to the mobile node. Route Optimization is the protocol suggested to eliminate the triangle routing problem and is described here. Duplicating fields in "IP within IP": To encapsulate the datagram, we put the original datagram inside another IP envelope, then the whole packet consists of the outer IP header plus the original datagram. The fields in the outer IP header add too much overhead to the final datagram -- several fields are duplicated from 214 Fig. 9: Triangle routing the inner IP header. This waste of unnecessary space is uneconomical. Minimal Encapsulation scheme is defined to overcome this problem and becomes another option to encapsulate the datagram. Fragility: Although single home agent model is simple and easy to configure, it has the disadvantage of fragility. The mobile node becomes unreachable once the home agent breaks down. One possible solution is to support multiple home agents. If one conventional home agent fails, there are still other home agents who can take over the duty and route the datagram to the mobile node. Dogleg routing: If a mobile node happens to move to the same subnetwork as its correspondent node that wants to send it datagrams, this is what will happen in order for the datagram to be received by the mobile node, based on the base Mobile IP protocol: the correspondent node will send the datagram all the way to the mobile node's home agent, which may be a half globe away; its home agent will then forward the datagram to its care-of-address, which might just take a half second to reach if the datagram is sent directly from the correspondent node. This kind of "indirect routing" is inefficient and undesirable. Security issues: The most pressing outstanding problem facing Mobile IP is that of security. A great deal of attention is being focused on making Mobile IP coexist with the security features coming into use within the Internet. Firewalls [18] in particular cause difficulty for Mobile IP because they block all classes of incoming packets that do not meet specified criteria. Enterprise firewalls are typically configured to block packets from entering via the Internet that appear to emantate from internal computers. Although this permits management of internal Internet nodes without great attention to security, it presents difficulties for mobile nodes wishing to communicate with other nodes within their home enterprise networks. such communications, originating from the mobile node, carry the mobile node's home address and would thus be blocked by the firewall [11].

5 J. Computer Sci., 2 (2): , 2006 ROUTE OPTIMIZATION Mobile IP suffers from the Triangle Routing, shown in Fig. 9. Packets sent from the mobile node to a correspondent node are delivered by normal Internet routing rules. But, when a correspondent node needs to send a datagram to a mobile node, it has to go through the home agent, This additional network travel increases the delays for incoming packets, increases the network congestion and create a routing bottleneck at the home agent [8]. The IETF is investigating the route optimization method for dealing with this problem [19]. The operation of the IETF method is as follows: When the Home Agent receives a packet destined to the mobile node from a correspondent node, it reports (Binding Update) a combination of the relevant mobile node's home address and care-of address (Binding Information), which the Home Agent itself is maintaining, to the correspondent node. The correspondent node maintains the Binding Information of the mobile node and tunnels subsequent packet transmissions to the mobile node's care-of address. Although the correspondent node maintains the Binding Information for a fixed interval, it will update the timer before a time-out occurs when it receives another Binding Update from the Home Agent. In the above description, the Home Agent decides to send out a Binding Update. However, there is also an option in which the correspondent node issues a request (Binding Request) to the Home Agent to send out a Binding Update. These functions described above enable the correspondent node to directly send packets to the mobile node without routing them through the Home Agent [3]. Thus, Route Optimization protocol uses the following four messages: Binding warning message: It is sent to the home agent to show a correspondent node that does not know the mobile node's care-of address. A binding warning message (Fig. 10) informs the recipient that the target node could benefit from obtaining a fresh binding for the mobile node. protecting against replay attacks and also to help match pending requests with subsequent updates. Fig. 11: Binding request message format Binding update message: The home agent sends an authenticated binding update message (Fig. 12) containing the mobile node's current care-of address to a correspondent node that needs it. This happens when the home agent receives a datagram addressed to a mobile node from the correspondent node, which subsequently has to be tunneled by the home agent to the mobile node's current care-of address. If the home agent has a security relationship with the correspondent node, it can send a binding update directly without waiting for any binding warning message or binding request. The binding included in the update must contain an associated lifetime, after which the binding is to be purged by the recipient. Fig. 12: Binding update message format Fig. 13: Binding acknowledgment message format Fig. 10: Binding warning message format Binding request message: Any time a correspondent node determines that its binding is stale, or is going stale, it can issue a binding request message (Fig. 11) to the home agent. The correspondent node sends a 64-bit number (the identification) to the home agent for use in Binding acknowledgment message: Figure 13 is used to acknowledge the reception of binding update messages. The 64-bit identification field protects against replays and allows the acknowledgment to be associated with a pending binding update. The N bit allows the recipient of the binding update to satisfy the A bit of the binding update, while informing the updating agent that the update was not acceptable [7]. 215

6 OVERVIEW ON MOBILE IPv6 IPv6 is derived from IPv4 and is in many ways similar to it. As such, the IETF Mobile IP Working Group's current protocol design [20] for mobility of IPv4 nodes could be adapted for use in IPv6, with only the straightforward changes needed to accommodate differences between IPv4 and IPv6 such as the size of addresses. The most visible difference is that IPv6 addresses are all 128 bits long, instead of 32 bits long as in IPv4. Within this huge address space, a tiny part is reserved for all current IPv4 addresses and another tiny part is reserved for the Link-Local addresses, which are not routable but are guaranteed to be unique on the local network. IPv6 defines several kinds of extension headers, which may be used to include additional information in the headers of an IPv6 packet. The Routing header is particularly useful for our mobility protocol and is similar to the Source Route options defined for IPv4. Mobile IPv6 basic operation: Mobile nodes should assign three IPv6 addresses to their network interface(s) at least whenever they are roaming away from their home subnet. One is its home address, which is permanently assigned to the mobile node in the same way as any IP node. The second address is the mobile node's current Link-Local address. The third address, known as the mobile node's care-of address, which is associated with the mobile node only while visiting a particular foreign subnet. The central data structure used in Mobile IPv6 is a cache of mobile node bindings, maintained by each IPv6 node, known as a Binding Cache. While away from home, a mobile node registers with a router in its home subnet, requesting this router to function as the home agent for the mobile node. While it has a home registration entry in its Binding Cache, the home agent uses proxy Neighbor Discovery to intercept any IPv6 packets addressed to the mobile node's home address on the home subnet and tunnels each intercepted packet to the mobile node's primary care-of address indicated in this Binding Cache entry. To tunnel the packet, the home agent encapsulates it using IPv6 encapsulation [21]. In addition, Mobile IPv6 provides a mechanism for IPv6 correspondent nodes communicating with a mobile node to dynamically learn the mobile node's binding. The correspondent node adds this binding to its Binding Cache. When sending a packet to any IPv6 destination, a node checks its Binding Cache for an entry for the packet's destination address and if a cached binding for this address is found, the node routes the packet directly to the mobile node at the careof address indicated in this binding; this routing uses an IPv6 Routing header [22] instead of IPv6 encapsulation. If no Binding Cache entry is found, the correspondent node instead sends the packet normally (with no Routing header) and the packet is then intercepted and J. Computer Sci., 2 (2): , tunneled by the mobile node's home agent as described above. Mobile IPv6 introduces two new IPv6 Destination options to allow a mobile node's home agent and correspondent nodes learn and cache the mobile node's binding. After configuring a new care-of address, a mobile node must send a Binding Update option containing that care-of address to its home agent and to any correspondent nodes that may have an out-of-date care-of address for the mobile node in their Binding Cache. Receipt of a Binding Update must be acknowledged using a Binding Acknowledgement option, if an acknowledgement was requested in the Binding Update [23]. The binding update option: A mobile node sends a Binding Update to an other node to inform it of its current binding. Since the Binding Update is sent as an IPv6 Destination option, the mobile node may include it in any existing packet that it is sending to that destination node, or it may send the Binding Update in a packet by itself. The Binding Update is used by a mobile node to register its primary care-of address with its home agent and to notify correspondent nodes of its binding so that they may create or update entries in their Binding Cache for use in future communication with the mobile node. Fig. 14: Binding update destination option format The format of the Binding Update option is shown in Fig. 14. The sending mobile node's home address must be the source address in the IPv6 header of the packet containing the Binding Update and thus need not be duplicated within the data of the Binding Update option. The binding acknowledgement option: The Binding Acknowledgement option is sent by a node to acknowledge receipt of a Binding Update. When a node receives a Binding Update addressed to itself, in which the Acknowledge (A) bit is set, it must return a Binding Acknowledgement. The destination address in the IPv6 header of the packet carrying the Binding Acknowledgement must be the care-of address from the Binding Update, causing the Binding Acknowledgement to be returned directly to the mobile

7 J. Computer Sci., 2 (2): , 2006 node sending the Binding Update. The format of the Binding Acknowledgement option is shown in Fig. 15. Fig. 15: Binding acknowledgment destination option format CONCLUSION Mobile IP is a proposal standard protocol that builds on the Internet protocol by making mobility transparent to applications and higher level protocols (like TCP). It is still in the process of being standardized and there are still many items that need to be worked on and enhanced such as the security issue and the routing issue. The IETF has been working on the problems which had been found on the base Mobile IP protocol. In this study we have presented an introduction to the base Mobile IP protocol (MIPv4) with it three major procedures: Agent discovery, Registration and Tunneling. we have outlined the alternative encapsulation techniques and route optimization procedure as well. In the end we have summarized Mobile Internet Protocol version 6 (MIPv6) with its basic operations and enhancements that allow transparent routing of IPv6 packets to mobile nodes, taking advantage of the opportunities made possible by the design of a new version of IP. REFERENCES 1. NTT DoCoMo Gateway Business Department. Do- CoMo i-mode. 3GPP SA2 S2-99E Combined GSM and Mobile IP Mobility Handling in UMTS IP CN (3G TR version 1.2.0). 3. Takagi, Y., Takeshi Ihara and Hiroyuki Ohnishi, Mobile ip route optimization method for next-generation mobile networks. Electronics and Communications in Japan, Part 1, 86: Chen, Y., A Survey Paper on Mobile IP. 5. Postel, J.B., (Ed.), Transmission Control Protocol. RFC Perkins, C., Mobile IP Design Principles and Practices. Addison Wesley Wireless Communications Series. 7. Perkins, C., Mobile IP. IEEE Comm., 35: Perkins, C., Mobile IP. Intl. J. Commnun. Syst., 11: Eastlake, D.E. and C.W. Kaufman, Domain name system protocol security extensions, draftietf-dnssec-secext-09.txt. 10. Postel, J.B., (Ed.), Internet Control Message Protocol, RFC Perkins, C., Mobile networking through Mobile IP. IEEE Internet Computing J., 12. Deering, S.E., (Ed.), ICMP Router Discovery Messages, IETF RFC Perkins, C., (Ed.), IP Mobility Support, RFC Perkins, C., IP Encapsulation Within IP, IETF RFC Postel, J., (Ed.), Internet Protocol, STD 5, RFC Atkinson, R., IP Authentication Header, RFC Perkins, C., Minimal Encapsulation Within IP, IETF RFC Cheswick, W.R. and S. Bellovin, Firewalls and Internet Security. Addison-Wesley, Reading, Mass. 19. Perkins, C., Route optimization in mobile IP. IETF draft.ietf.mobileip.optim-09.txt. 20. Perkins, C., (Ed.), IPv4 Mobility Support. ietf-draft-mobileip-protocol-17.txt. 21. Conta, A. and S. Deering, Generic Packet Tunneling in IPv6. ftp://ftp.ietf.org/internetdrafts/draft-ietf-ipngwg-ipv6-tunnel-07.txt. 22. Deering, S. and R. Hinden, Internet Protocol. Version 6 (IPv6) Specification. RFC Johnson, D. and C. Perkins, Mobility support in IPv6. ACM Mobi-Com 96, ACM, pp:

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4. CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer Diwakar Yagyasen.1 Effect of Mobility on Protocol Stack Application: new applications and adaptations Transport:

More information

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Mobile IP. Mobile Computing. Mobility versus Portability

Mobile IP. Mobile Computing. Mobility versus Portability Mobile IP Mobile Computing Introduction Amount of mobile/nomadic computing expected to increase dramatically in near future. By looking at the great acceptance of mobile telephony, one can foresee a similar

More information

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This

More information

Request for Comments: 2004 Category: Standards Track October Minimal Encapsulation within IP. Status of This Memo

Request for Comments: 2004 Category: Standards Track October Minimal Encapsulation within IP. Status of This Memo Network Working Group C. Perkins Request for Comments: 2004 IBM Category: Standards Track October 1996 Status of This Memo Minimal Encapsulation within IP This document specifies an Internet standards

More information

Mobility Support in IPv6

Mobility Support in IPv6 Mobility Support in IPv6 Charles E. Perkins David B. Johnson T. J. Watson Research Center Computer Science Department IBM Corporation Carnegie Mellon University Hawthorne, NY 10532 Pittsburgh, PA 15213

More information

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP Introduction: Mobile IP Overview An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet

More information

11. IP Mobility 최 양 희 서울대학교 컴퓨터공학부

11. IP Mobility 최 양 희 서울대학교 컴퓨터공학부 11. IP Mobility Introduction Terminal Mobility Person Mobility Network Mobility Internet 2002 Yanghee Choi 2 Mobile IP : Why IP addressing scheme optimized for stationary environment point of attachment

More information

Mobility Management - Basics

Mobility Management - Basics Mobility Management - Basics Summer Semester 2012 Integrated Communication Systems Group Ilmenau University of Technology Content Motivation Problem and possible solutions IP-based mobility management

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration

More information

Mobile Communications Mobility Support in Network Layer

Mobile Communications Mobility Support in Network Layer Motivation Mobility support needed to be able to use mobile devices in the Mobile devices need IP address for their communication Applications would like to communicate while being on the move Mobile Communications

More information

Mobile IP and Mobile Transport Protocols

Mobile IP and Mobile Transport Protocols Mobile IP and Mobile Transport Protocols 1 IP routing Preliminaries Works on a hop-by-hop basis using a routing table 32 bits: 129.97.92.42 Address = subnet + host (Mobility No packet for you) Two parts»

More information

Mobile & Wireless Networking. Lecture 9: Mobile IP. [Schiller, Section 8.1]

Mobile & Wireless Networking. Lecture 9: Mobile IP. [Schiller, Section 8.1] 192620010 Mobile & Wireless Networking Lecture 9: Mobile IP [Schiller, Section 8.1] Geert Heijenk Outline of Lecture 11 q Mobile IP Basics q 3 parts of Mobile IP: q Advertising Care-of Addresses q Registration

More information

Module 28 Mobile IP: Discovery, Registration and Tunneling

Module 28 Mobile IP: Discovery, Registration and Tunneling Module 28 Mobile IP: Discovery, and Tunneling Learning Objectives Introduction to different phases of Mobile IP Understanding how a mobile node search the agents using Discovery process Understand how

More information

Obsoletes: 2002 January 2002 Category: Standards Track

Obsoletes: 2002 January 2002 Category: Standards Track Network Working Group C. Perkins, Ed. Request for Comments: 3220 Nokia Research Center Obsoletes: 2002 January 2002 Category: Standards Track Status of this Memo IP Mobility Support for IPv4 This document

More information

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G.

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G. Network Security Chapter 17 Security of Mobile Internet Communications Network Security (WS 2002): 17 Mobile Internet Security 1 Motivation for Mobile IP Routing in the Internet: Based on IP destination

More information

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1 Mobile IP Petr Grygárek rek 1 Basic principle Picture from IOS IP and IP Routing Configuration Guide Mobile node maintains the same IP address even while roaming in foreign networks even if it s address

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

Mobile Communications Chapter 9: Network Protocols/Mobile IP

Mobile Communications Chapter 9: Network Protocols/Mobile IP Mobile Communications Chapter 9: Network Protocols/Mobile IP Motivation Data transfer Encapsulation Security IPv6 Problems DHCP Ad-hoc s Routing protocols 9.0.1 Motivation for Mobile IP Routing based on

More information

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology 2005 / High Speed Networks II Outline Introduction Mobility Support Overview of IPv6 Mobility Support Handover Management Mobility Support What means Mobility Support? allow transparent routing of IPv6

More information

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

Mobility Management Basics

Mobility Management Basics Mobility Management Basics Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Content Motivation Problem and possible solutions IP-based mobility management Conclusions

More information

Last time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling

Last time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling Last time BGP policy Broadcast / multicast routing Spanning trees Source-based, group-shared, center-based Reverse path forwarding, pruning Tunneling Link virtualization Whole networks can act as an Internet

More information

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Mobile Communications Chapter 8: Network Protocols/Mobile IP Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer, Encapsulation Security, IPv6, Problems Micro mobility support DHCP Ad-hoc networks, Routing protocols Prof. Jó Ueyama

More information

SJTU 2018 Fall Computer Networking. Wireless Communication

SJTU 2018 Fall Computer Networking. Wireless Communication SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP

More information

Mobile IP. Mobile IP 1

Mobile IP. Mobile IP 1 Mobile IP Mobile IP 1 Motivation for Mobile IP Routing based on IP destination address, network prefix (e.g. 129.13.42) determines physical subnet change of physical subnet implies change of IP address

More information

MESSAGES error-reporting messages and query messages. problems processes IP packet specific information

MESSAGES error-reporting messages and query messages. problems processes IP packet specific information ICMP ICMP ICMP is mainly used by operating systems of networked computers to send error messages indicating that a requested service is not available or that host/ router could not be reached. ICMP MESSAGES

More information

How Mobile IP Works? Presenter: Ajoy Singh

How Mobile IP Works? Presenter: Ajoy Singh How Mobile IP Works? Presenter: Ajoy Singh Agenda Required background What problems does Mobile IP solve? Mobile IP: protocol overview Scope Requirements Design goals Functional entities 5/2/2002 How Mobile

More information

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local 1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to

More information

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004 CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the

More information

Location Management Agent for SCTP Handover in Mobile Network

Location Management Agent for SCTP Handover in Mobile Network Location Management Agent for SCTP Handover in Mobile Network Yong-Jin Lee Department of Technology Education, Korea National University of Education 250 Taesungtapyon-ro, Heungduk-ku, Cheongju, South

More information

ROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX

ROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX ROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX ABSTRACT The base Mobile Internet Protocol (Mobile IP) provides a means for portable computers to roam freely, changing its point

More information

MOBILE IP AND WIRELESS APPLICATION PROTOCOL

MOBILE IP AND WIRELESS APPLICATION PROTOCOL MOBILE IP AND WIRELESS APPLICATION PROTOCOL In this chapter, we look at two standards that provide application-level support for wireless networking: Mobile IP and Wireless Application Protocol (WAP).

More information

Mobile IPv6 Overview

Mobile IPv6 Overview Sungkyunkwan University Prepared by H. Choo Copyright 2000-2018 Networking Laboratory Lecture Outline Network Layer Mobile IPv6 Proxy Mobile IPv6 Networking Laboratory 2/87 Sungkyunkwan University Network

More information

CSE 123A Computer Netwrking

CSE 123A Computer Netwrking CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore

More information

ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX

ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX M. L. Jiang and Y. C. Tay ABSTRACT The base Mobile Internet Protocol (Mobile IP)[1] provides a means for portable computers to roam

More information

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 185-189 A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols B.V. Manikyala Rao

More information

Introduction to IPv6. IPv6 addresses

Introduction to IPv6. IPv6 addresses Introduction to IPv6 (Chapter 4 in Huitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A

More information

IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol

IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol Ryuji Wakikawa Carl Williams Keisuke Uehara Jun Murai Keio University. Graduate School of Media and Governance KDDI

More information

1 Introduction. In this paper, we describe the design of a new protocol. of IP (IPv4) [22]. IPv6 is in the nal stages of design

1 Introduction. In this paper, we describe the design of a new protocol. of IP (IPv4) [22]. IPv6 is in the nal stages of design Mobility Support in IPv6 Charles E. Perkins David B. Johnson T. J. Watson Research Center Computer Science Department IBM Corporation Carnegie Mellon University Hawthorne, NY 10532 Pittsburgh, PA 15213

More information

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 1 Hui Deng 2Xiaolong Huang 3Kai Zhang 3 Zhisheng Niu 1Masahiro Ojima 1R&D Center Hitachi (China) Ltd. Beijing 100004, China 2Dept.

More information

Modification to Ipv6 Neighbor Discovery and Mobile Node Operation

Modification to Ipv6 Neighbor Discovery and Mobile Node Operation RESEARCH INVENTY: International Journal of Engineering and Science ISSN: 2278-4721, Vol. 1, Issue 6 (October 2012), PP 39-49 www.researchinventy.com Modification to Ipv6 Neighbor Discovery and Mobile Node

More information

Internet Engineering Task Force (IETF) Ericsson July 2011

Internet Engineering Task Force (IETF) Ericsson July 2011 Internet Engineering Task Force (IETF) Request for Comments: 6275 Obsoletes: 3775 Category: Standards Track ISSN: 2070-1721 C. Perkins, Ed. Tellabs, Inc. D. Johnson Rice University J. Arkko Ericsson July

More information

What is mobility? Mobile IP. Mobility Impact on Protocol Stack (cont.) Advanced Topics in Computer Networks

What is mobility? Mobile IP. Mobility Impact on Protocol Stack (cont.) Advanced Topics in Computer Networks Advanced Topics in Computer Networks What is mobility? spectrum of mobility, from the perspective: Mobile IP no mobility high mobility Chalermek Intanagonwiwat Slides courtesy of James F. Kurose, Keith

More information

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers Network Working Group H. Soliman, Ed. Request for Comments: 5555 Elevate Technologies Category: Standards Track June 2009 Status of This Memo Mobile IPv6 Support for Dual Stack Hosts and Routers This document

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile

More information

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003 CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last

More information

Handover Management for Mobile Nodes in IPv6 Networks

Handover Management for Mobile Nodes in IPv6 Networks TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we

More information

This chapter introduces protocols and mechanisms developed for the network

This chapter introduces protocols and mechanisms developed for the network Mobile network layer 8 This chapter introduces protocols and mechanisms developed for the network layer to support mobility. The most prominent example is Mobile IP, discussed in the first section, which

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 9 CMPE 257 Winter'10 1 Announcements Student presentations: March 8th: Daniel and Teddy March

More information

Binding information contains the entries in the mobility binding table.

Binding information contains the entries in the mobility binding table. GLOSSARY Numerics 802.11b/g An IEEE specification for a wireless LAN airlink. A agent advertisement agent discovery agent solicitation An advertisement message constructed by attachment of a special extension

More information

Introduction to IPv6. IPv6 addresses

Introduction to IPv6. IPv6 addresses Introduction to IPv6 (Chapter4inHuitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit hexadecimal integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 8 CMPE 257 Winter'11 1 Announcements: Student presentations: Security: Jim. Seth: security in

More information

Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6

Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6 Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6 Ved P. Kafle Department of Informatics The Graduate University for Advanced Studies Tokyo, Japan Eiji Kamioka and Shigeki

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Literature: Forouzan ch.27 Lecture 9: Mobile IP Article: Mobile IP by Charles E. Perkins, IEEE Communications Magazine,Vol. 40, Issue: 5, May 2002, Pages:66-82 Lecture 9: Mobile IP Goals: Article: IP multimedia

More information

Mobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

Mobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology Mobility Management Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology Motivation The Internet and mobile communication networks are experiencing

More information

Internet Services & Protocols. Mobile and Wireless Networks

Internet Services & Protocols. Mobile and Wireless Networks Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Mobile and Wireless Networks Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: stephan.gross@tu-dresden.de

More information

Introduction to IPv6. IPv6 addresses

Introduction to IPv6. IPv6 addresses Introduction to IPv6 (Chapter 4 in Huitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A

More information

Foreword xxiii Preface xxvii IPv6 Rationale and Features

Foreword xxiii Preface xxvii IPv6 Rationale and Features Contents Foreword Preface xxiii xxvii 1 IPv6 Rationale and Features 1 1.1 Internet Growth 1 1.1.1 IPv4 Addressing 1 1.1.2 IPv4 Address Space Utilization 3 1.1.3 Network Address Translation 5 1.1.4 HTTP

More information

Request for Comments: Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009

Request for Comments: Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009 Network Working Group Request for Comments: 5648 Category: Standards Track R. Wakikawa, Ed. Toyota ITC V. Devarapalli Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009 Multiple

More information

Use of IPSec in Mobile IP

Use of IPSec in Mobile IP Department of Electrical and Computer Engineering ELEG 777 Internet Engineering ( TERM PAPER ) Use of IPSec in Mobile IP DONE BY: SALEM ITANI ID #: 20011003 SUBMITTED TO: Dr. AYMAN KAYSSI DATE: MAY 21,

More information

COM 13 C 28 E May 2003 English only Original: English

COM 13 C 28 E May 2003 English only Original: English Question(s): 11/13 Source: Title: INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2001-2004 Editor STUDY GROUP 13 CONTRIBUTION 28 May 2003 English only Original:

More information

Computer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the

Computer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the Mobile IP (IPv4 and IPv6) Dr. John Keeney 3BA33 Elements of a wireless Wired infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile wireless does not

More information

Chapter 8 LOCATION SERVICES

Chapter 8 LOCATION SERVICES Chapter 8 LOCATION SERVICES Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Mobile IP Motivation Data transfer Encapsulation Location Services & Routing Classification of location

More information

Mobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

Mobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology Mobility Management Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology Motivation The Internet and mobile communication networks are experiencing

More information

An Enhancement of Mobile IP by Home Agent Handover

An Enhancement of Mobile IP by Home Agent Handover An Enhancement of Mobile IP by Home Agent Handover Li-Sheng Yu and Chun-Chuan Yang Multimedia and Communications Laboratory Department of Computer Science and Information Engineering National Chi Nan University,

More information

Network Layer (4): ICMP

Network Layer (4): ICMP 1 Network Layer (4): ICMP Required reading: Kurose 4.4.3, 4.4.4 CSE 4213, Fall 2006 Instructor: N. Vlajic 2 1. Introduction 2. Network Service Models 3. Architecture 4. Network Layer Protocols in the Internet

More information

CSC 4900 Computer Networks: Mobility

CSC 4900 Computer Networks: Mobility CSC 4900 Computer Networks: Mobility Professor Henry Carter Fall 2017 Last Time What is the hidden terminal problem? How do CDMA networks use spectrum differently than TDMA systems? What is a chipping

More information

Utilizing Multiple Home Links in Mobile IPv6

Utilizing Multiple Home Links in Mobile IPv6 Utilizing Multiple Home Links in Mobile IPv6 Hongbo Shi and Shigeki Goto Department of Computer Science, Waseda University 3-4-1 Ohkubo Shijuku-ku, Tokyo, 169-8555 JAPAN Email: {shi, goto}@goto.info.waseda.ac.jp

More information

An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6

An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 Taewan You 1, Seungyun Lee 1, Sangheon Pack 2, and Yanghee Choi 2 1 Protocol Engineering Center, ETRI, 161 Gajoung-dong, Yusong-gu,

More information

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on IP Version 4 (IPv4) Header (Continued) Identification (16 bits): One of the parameters of any network is the maximum transmission unit (MTU) parameter. This parameter specifies the maximum size of the

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Lecture 7: Mobile IP (Part 1) Dr. Reynold Cheng

Lecture 7: Mobile IP (Part 1) Dr. Reynold Cheng Lecture 7: Mobile IP (Part 1) Dr. Reynold Cheng This lecture is based on the textbook W. Stallings, Wireless Communications and Networks, Prentice Hall, 2005, the slides (prepared by Tom Fronckowiak) and

More information

Fast Handover in Mobile IPv4 and IPv6

Fast Handover in Mobile IPv4 and IPv6 Fast Handover in Mobile IPv4 and IPv6 Raoul Schmidiger & Gregor Zographos April 28, 2005 Seminar: Mobile Systems Talk No.4 Content IPv4 (Gregor) IPv6 (Raoul) Problems in IP mobility (Gregor) Standards

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Mobile IP. Page 1. 10/5/98 Mohamed Khalil IP10 MKIPM001

Mobile IP. Page 1. 10/5/98 Mohamed Khalil IP10 MKIPM001 Introduction In the last few years the number of notebook users has been increased tremendously, due to the great improvement in this technology with respect to size, speed, and weight. In addition, most

More information

312 D.B. Johnson /Scalable support for transparent mobile host internetworking work, it is then delivered to the correct individual host on that netwo

312 D.B. Johnson /Scalable support for transparent mobile host internetworking work, it is then delivered to the correct individual host on that netwo Wireless Networks 1 (1995) 311^321 311 Scalable support for transparent mobile host internetworking 3 David B. Johnson Computer Science Department, Carnegie Mellon University, Pittsburgh, PA, USA Abstract.

More information

Overview of the MIPv6 Implementation

Overview of the MIPv6 Implementation Overview of the MIPv6 Implementation Tunneling Tunneling support was added as it is necessary for MIPv6. Interfaces have interfaceids that uniquely identify them. Similarly, every tunnel has a virtual

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

Internetwork Protocols

Internetwork Protocols Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications

More information

Module 7 Internet And Internet Protocol Suite

Module 7 Internet And Internet Protocol Suite Module 7 Internet And Internet Protocol Suite Lesson 22 IP addressing. ICMP LESSON OBJECTIVE General The lesson will continue the discussion on IPv4 along with the idea of ICMP. Specific The focus areas

More information

The Internetworking Problem. Internetworking. A Translation-based Solution

The Internetworking Problem. Internetworking. A Translation-based Solution Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem

More information

Network Working Group Request for Comments: Nokia Research Center F. Dupont GET/ENST Bretagne June 2004

Network Working Group Request for Comments: Nokia Research Center F. Dupont GET/ENST Bretagne June 2004 Network Working Group Request for Comments: 3776 Category: Standards Track J. Arkko Ericsson V. Devarapalli Nokia Research Center F. Dupont GET/ENST Bretagne June 2004 Using IPsec to Protect Mobile IPv6

More information

Route Optimization based on ND-Proxy for Mobile Nodes in IPv6 Mobile Networks

Route Optimization based on ND-Proxy for Mobile Nodes in IPv6 Mobile Networks Route Optimization based on ND-Proxy for Mobile Nodes in IPv6 Mobile Networks Jaehoon Jeong, Kyeongjin Lee, Jungsoo Park, Hyoungjun Kim Protocol Engineering Center, ETRI, 161 Gajeong-dong Yuseong-gu, Daejeon,

More information

Mobile IPv6. Raj Jain. Washington University in St. Louis

Mobile IPv6. Raj Jain. Washington University in St. Louis Mobile IPv6 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 13-1 Overview! IPv6:

More information

A Study on Mobile IPv6 Based Mobility Management Architecture

A Study on Mobile IPv6 Based Mobility Management Architecture UDC 621.396.69:681.32 A Study on Mobile IPv6 Based Mobility Management Architecture VTsuguo Kato VRyuichi Takechi VHideaki Ono (Manuscript received January 19, 2001) Mobile IPv6 is considered to be one

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS Sandro Grech Nokia Networks (Networks Systems Research) Supervisor: Prof. Raimo Kantola 1 SANDRO GRECH - OPTIMIZING MOBILITY MANAGEMENT IN

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Enhanced Mobile IP Protocol

Enhanced Mobile IP Protocol Enhanced Mobile IP Protocol Baher Esmat, Mikhail N. Mikhail, Amr El Kadi Department of Computer Science, The American University in Cairo, Cairo, Egypt {besmat, mikhail, elkadi}@aucegypt.edu Abstract.

More information

A Survey on Signaling Load in Mobility Management

A Survey on Signaling Load in Mobility Management ISSN: 2231-4946 Volume IV, Special Issue, December 2014 International Journal of Computer Applications in Engineering Sciences Special Issue on Advances in Computer and Communications www.caesjournals.org

More information

Fast Location Opposite Update Scheme for Minimizing Handover Latency over Wireless/Mobile Networks

Fast Location Opposite Update Scheme for Minimizing Handover Latency over Wireless/Mobile Networks Fast Location Opposite Update Scheme for Minimizing Handover Latency over Wireless/Mobile Networks Sunguk Lee Research Institute of Industrial Science and Technology Pohang, Gyeongbuk, 790-330, S.KOREA

More information